I'm looking for your tips and hints regarding TP best practices.
(hopefully this newbee question is not too bad :smileyconfused:)
Let me explain our setup:
As a first step to a new IT Security Infrastructure we are running a HA-pair of PA-3050 in an "IPS Mode" behind our current firewalls.
From configuration point of view it means that we have a set of virtual wires with "allow any / inspect all" rules.
The security profiles are currently copies of the "default" profiels for antivirus, anti-spyware and vulnerability protection.
Basically this works fine since we've started:
Only a few actions beside "alert" which had no impact on normal operations.
But what about the lots of "alerts"?
Do we need to reserch on each and every of them?
Shall we tune the rules?
Is the "default" setting still ok?
Or are you running more in "strict" mode?
Right now I'm a little bit confused. Which might be also related so some of the "not so perfect" AV and TP Updates of the last days.
Please help me to get out and to makes best use of our PAs.
Welcome to PanOS. There is a good overview document on all the threat prevention features and standard deploys below. The general trade off between alert and block is the impact in your environment of false positives. Palo Alto is very conservative in terms of blocking potentially legitimate traffic and will set for an alert default. But as you see, these then require research to determine if this was a real threat or a false positive. Once you are confident they are not false positives you can migrate from alert to block and have less to research. You can make this determination signature by signature and build your own customized block to override each former alert. Likewise if you see the alerts are false you can change these signatures so that no alert is generated anymore for that signature.
We have anything categorized as medium or higher to be blocked. We are looking at doing the same with low. I would not do Info since it will block legit requests.
thank you for your warm welcome and especially for the link to the real good overview document.
By reading the document I've found that we've done a lot of things the right way - thanks to our consultant.
Additionally my understanding of the system has been improved with the document.
Nevertheless I guess that it needs even more experience with the system to feel real confident.
oklier has pointed out the interessting topic: How to move forward from the "default" setting without causing to much trouble for users and IT.
So more answers are appreciated. Maybe some other end users share their experience.
As per what Steven Puluka said, default protections are a good start. If you decided you want to be more strict in any area you will want to make sure you do a thorough analysis to make sure that you don't affect legitimate traffic. You could do this by running some custom reports on threats that are logging as alerts and then investigate that traffic and device that is being hit by those threats. If you have a specific threat you are concerned about that is not blocking, you can also report on that specific threat.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!